Search Results - (( utilization interest protocol algorithm ) OR ( java implication based algorithm ))
Search alternatives:
- protocol algorithm »
- interest protocol »
- implication based »
- java implication »
- utilization »
-
1
Evaluation of UDP-based reliable transport protocols in wireless network / Madzirin Masirap
Published 2014“…The paper findings are, PA-UDP protocol has the best transport performance but it requires high CPU utilization during the start and end of transmission at the receiver side. …”
Get full text
Get full text
Thesis -
2
Evaluation of UDP-based reliable transport protocols in wireless network: article / Madzirin Masirap
Published 2014“…The paper findings are, PA-UDP protocol has the best transport performance but it requires high CPU utilization during the start and end of transmission at the receiver side. …”
Get full text
Get full text
Article -
3
An Improved LEACH Algorithm Based On Fuzzy C-Means Algorithm And Distributed Cluster Head Selection Mechanism.
Published 2019“…The most famous protocol that utilized clustering technique is Low Energy Adaptive Clustering Hierarchy (LEACH). …”
Get full text
Get full text
Get full text
Article -
4
Experimental evaluation of bottleneck link utilization with new-additive increase multiplicative decrease congestion avoidance and control algorithm.
Published 2009“…And also all the developments for the congestion control and avoidance algorithms interest about the using of network resources and use the links capacity (utilization). …”
Get full text
Get full text
Article -
5
Efficient back-off mechanism for IEEE 802.15.4 wireless sensor networks
Published 2013“…One of the major protocols of our interest is MAC protocol. Different contention-based MAC Protocols for Wireless Sensor Networks (WSNs) have been proposed over the last few years. …”
Get full text
Get full text
Thesis -
6
Secure ACO-Based Wireless Sensor Network Routing Algorithm for IoT
Published 2021“…The problem of developing effective and secure routing protocols has drawn more interest in network research with the popularization of IoT-connected devices. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
7
Secure and Energy-Efficient Data Aggregation Method Based on an Access Control Model
Published 2019“…Furthermore, the attacks are detected and prevented by utilizing secure node authentication, data fragmentation algorithms, fully homomorphic encryption, and access control model. …”
Get full text
Get full text
Article -
8
TELE-OPERATED ROBOT USING VC PROGRAMMING PROTOCOL
Published 2007Get full text
Get full text
Final Year Project -
9
Impact of low-dose protocols on computed tomography of lung cancer screening on the intrinsic performance metrics: a phantom study
Published 2023“…TTF and CNR are considered the most important performance measures for protocol optimisation as they enhance the contrast and spatial resolution for the background and region of interest.…”
Get full text
Get full text
Conference or Workshop Item -
10
Enhancing NoC-based MPSoC performance: a predictive approach with ANN and guaranteed convergence arithmetic optimization algorithm
Published 2023“…The main idea of the proposed method is to develop a prediction model, speci‚cally an Arti‚cial Neural Network (ANN) optimized using the Guaranteed Convergence Arithmetic Optimization Algorithm (GCAOA-ANN), for predicting the utilized routing algorithm in NoC-based MPSoC platform during the DSE process. …”
Get full text
Get full text
Article -
11
-
12
-
13
A smart metering for energy management system via GSM-SMS based protocol
Published 2011“…The proposed monitoring system consist of a new energy calculation algorithm, offering electricity packages with a intelligent monitoring for daily power consumption connected to base-station via GSM network. …”
Get full text
Get full text
Undergraduates Project Papers -
14
Wireless cameras network for Intelligent Traffic Surveillance system
Published 2009Get full text
Working Paper -
15
Digital Quran With Storage Optimization Through Duplication Handling And Compressed Sparse Matrix Method
Published 2024thesis::doctoral thesis -
16
Incremental learning for large-scale stream data and its application to cybersecurity
Published 2015“…In Chapter 4, we propose a fast Distributed Denial of Service (DDoS) backscat�ter detection system to detect DDoS backscatter from a combination of protocols and ports other than the following two labeled packets: Transmission Control Protocol (TCP) Port 80 (80/TCP) and User datagram Protocol (UDP) Port 53 (53/UDP). …”
Get full text
Get full text
Thesis
